Description
ZOO-Project is a C-based WPS (Web Processing Service) implementation. A path traversal vulnerability was discovered in Zoo-Project Echo example. The Echo example available by default in Zoo installs implements file caching, which can be controlled by user-given parameters. No input validation is performed in this parameter, which allows an attacker to fully control the file which is returned in the response. Patch was committed in November 22nd, 2024.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/ZOO-Project/ZOO-Project/security/advisories/GHSA-93rv-45r8-h5j4
Scores
CVSS v4
8.7
EPSS
0.0019
EPSS Percentile
40.9%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-434
Status
published
Products (1)
ZOO-Project/ZOO-Project
< 641cb18fec58de43a3468f314e5f8808c560e6d9
Published
Dec 04, 2024
Tracked Since
Feb 18, 2026